System and method for securing machine-to-machine communications

a technology of machine-to-machine communication and communication system, applied in the field of system and system for securing communication in the internet of things, can solve problems such as unsupervised nature of m2m devices, fraudulent modification or other tampering of m2m devices placed in unprotected publicly accessible locations, and possible security risks, so as to improve the security of information transferred.

Active Publication Date: 2016-11-17
GEMPLU
View PDF0 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0034]With the present invention, only authorized consumer applications are entitled to securely access the M2M server for Policy Enforcement and the M2M device for data encryption. The M2M server and M2M Device do not encompass any user information but delegate user management and access control to external M2M authorization server. The M2M server and M2M Device ...

Problems solved by technology

M2M devices differ from other ordinary network subscribers primarily with respect to data usage; M2M devices typically are not flexibly accessed or programmed; and their software is not written to operate with the wide variety of services that a human subscriber can handle.
A drawback to the aforementioned M2M architecture is that there are several potential security risks.
Indee...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for securing machine-to-machine communications
  • System and method for securing machine-to-machine communications
  • System and method for securing machine-to-machine communications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076]The present invention is not specific to any particular hardware or software implementation, and is at a conceptual level above specifics of implementation. It is to be understood that various other embodiments and variations of the invention may be produced without departing from the spirit or scope of the invention. The following is provided to assist in understanding the practical implementation of particular embodiments of the invention.

[0077]The same elements have been designated with the same referenced numerals in the different drawings. For clarity, only those elements and steps which are useful to the understanding of the present invention have been shown in the drawings and will be described.

[0078]Further, the mechanisms of data communication between the parties and their environment have not been detailed either, the present invention being here again compatible with usual mechanisms.

[0079]Furthermore, the connecting lines shown in the various figures contained here...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention concerns the implementation of end-to-end security for the communication between objects in the domain of the Internet of Things (or Internet of Objects). The purpose of the patent is dealing with the setup of secure authorized information channel between data source (M2M device) and data consumers (consumer entity). According to the present invention, the access to a M2M device by a consumer entity (consumer application) is controlled by a M2M authorization server. The M2M authorization server is the entity in charge of managing access rights for the M2M device and makes the decision regarding the access to the resource by the consumer entity (consumer application). The M2M server is an entity that enforces the decision and enables the access to the M2M device. When a consumer application needs to communicate with a M2M device, the present invention proposes a method for authorizing a consumer application to access a M2M device and for encrypting the communication between the consumer application and the M2M device. The M2M authorization server computes security credentials which are sent to the consumer application.

Description

TECHNICAL FIELD[0001]The present invention generally relates to systems and methods for securing communications in the Internet of Things.[0002]Particularly, the present invention relates to a method and system for securing access to resources in the Internet of things.BACKGROUND ART[0003]Many new applications have begun to emerge with the expanding deployment of cellular network infrastructure. The machine-to-machine (M2M) market is one specific segment that has gained considerable widespread usage. This fast-growing market is predicted to see billions of machines interconnected in a near future.[0004]A typical M2M system comprises a M2M device, an M2M server, a network part (including logical function entities such as a network element of an access network, a network element of a core network, . . . ). The M2M server stores related data information of M2M devices or groups for providing M2M services. For example, the M2M device is a water or electricity meters, and the M2M server ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W4/00H04W12/06H04W4/70
CPCH04L63/0884H04L63/062H04W4/005H04L63/0428H04W12/06H04W4/70H04W12/069
Inventor SMADJA, PHILIPPEDELSUC, JULIENGANEM, HERVE
Owner GEMPLU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products